Search Results for S&#304;DE. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dS$0025C4$0025B0DE.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-31T13:54:21Z Embedded cryptography 2 ent://SD_ILS/0/SD_ILS:599724 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain ent://SD_ILS/0/SD_ILS:599650 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Li, Hu, author.&#160;Wang, Han, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 L5 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> BEHIND THE AI MASK protecting your business from deepfakes. ent://SD_ILS/0/SD_ILS:600411 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;BOGAN, CARL.<br/>Preferred Shelf Number&#160;XX(600411.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Creative approaches towards development of computing and multidisciplinary IT solutions for society ent://SD_ILS/0/SD_ILS:599371 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Bijalwan, Anchit, editor.<br/>Preferred Shelf Number&#160;QA76 .C74 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metaheuristics for maritime operations ent://SD_ILS/0/SD_ILS:594496 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Homayouni, S. Mahdi, author.&#160;Fontes, Dalila B. M. M., author.<br/>Preferred Shelf Number&#160;HE571<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119483151">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119483151</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PMI-ACP : Project Management Institute Agile Certified Practitioner exam study guide ent://SD_ILS/0/SD_ILS:594249 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Hunt, J. Ashley, author.&#160;Project Management Institute.<br/>Preferred Shelf Number&#160;HD69 .P75<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549222">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549222</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> JavaScript and open data ent://SD_ILS/0/SD_ILS:594621 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Jeansoulin, Robert, author.<br/>Preferred Shelf Number&#160;QA76.73 .J39 J43 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119451761">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119451761</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-03-31T13:54:21Z 2026-03-31T13:54:21Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>